As few of you might have seen, I’ve written a few posts earlier on securing your datacenter and server environment but I’ve been having this article in the back of my mind to try and describe step by step how a hacker actually works. At least how I would go about to try and hack someones servers or launch a DOS/DDOS attack on them.
The thought is to write a step-by-step thinh and also suggest various countermeasures if they exist ..
I wonder if anyone actually would read it and if I’d get more consultancy from it 🙂 .

